Dynmx Prototype: An Advanced API Call Trace Analysis Tool for Malware Detection

2 years ago

dynmx (spoken dynamics) is a signature-based detection approach for behavioural malware features based on Windows API call sequences. In a simplified way,…

JSON Crack: Transform Your Data into Interactive Visualizations

2 years ago

An innovative, open source data visualization app. Brings data to life through captivating graphs. JSON Crack (jsoncrack.com) JSON Crack is…

Karton-Pcap-Miner: Streamlining Network Indicator Extraction from PCAPs

2 years ago

Karton-Pcap-Miner is a strong program that quickly pulls network indicators from analysis PCAP files." It works with MWDB without any…

Crawlector – Empowering Threat-Hunting With Advanced Web Scanning And Detection

2 years ago

Crawlector (the name Crawlector is a combination of Crawler & Detector) is a threat-hunting framework designed for scanning websites for malicious objects. Note-1:…

31 Tips from Inon Shkedy’s Challenge – Mastering API Security

2 years ago

This challenge is Inon Shkedy's 31 days API Security Tips -API TIP: 1/31- Older APIs versions tend to be more…

InfoSec Black Friday Deals – “Friday Hack Fest” 2023 Edition

2 years ago

All the deals for InfoSec related software/tools this Black Friday / Cyber Monday. Just 2023 Things Quality over quantity -…

Hades Command And Control – Learning Malware Development and CTFsHades Command & Control

2 years ago

Hades is a basic Command & Control server built using Python. It is currently extremely bare bones, but I plan…

Forbidden Buster: Mastering HTTP 401 and 403 Bypass Techniques

2 years ago

Forbidden Buster is a tool designed to automate various techniques in order to bypass HTTP 401 and 403 response codes…

Goblob: Azure Blob Storage Enumeration Tool

2 years ago

Goblob is a lightweight and fast enumeration tool designed to aid in the discovery of sensitive information exposed publicy in…

Top Penetration Testing Software & Tools – Essential for Security Assessments

2 years ago

This article offers a comprehensive overview of the nine most commonly utilized penetration testing tools in the cybersecurity domain. The…